From bb37fe07984f55957bdf5ba45d9ef1d40b87b964 Mon Sep 17 00:00:00 2001 From: David Karlsson <35727626+dvdksn@users.noreply.github.com> Date: Mon, 9 Feb 2026 13:10:57 +0000 Subject: [PATCH] sandboxes: document default network policy Add canonical reference section for default network policy configuration, including policy mode, blocked CIDRs, and allowed hosts. --- .../manuals/ai/sandboxes/network-policies.md | 41 +++++++++++++------ 1 file changed, 29 insertions(+), 12 deletions(-) diff --git a/content/manuals/ai/sandboxes/network-policies.md b/content/manuals/ai/sandboxes/network-policies.md index bc7aae314b..ee30c4ce27 100644 --- a/content/manuals/ai/sandboxes/network-policies.md +++ b/content/manuals/ai/sandboxes/network-policies.md @@ -61,6 +61,32 @@ the allow-list (e.g., `localhost:1234`). HTTP requests to `host.docker.internal` are rewritten to `localhost`, so only the name `localhost` will work in the allow-list. +## Default policy + +New sandboxes use this default policy unless you configure a custom policy: + +**Policy mode:** `allow` (permit all traffic except what's explicitly blocked) + +**Blocked CIDRs:** + +- `10.0.0.0/8` - Private network (Class A) +- `127.0.0.0/8` - Loopback addresses +- `169.254.0.0/16` - Link-local addresses +- `172.16.0.0/12` - Private network (Class B) +- `192.168.0.0/16` - Private network (Class C) +- `::1/128` - IPv6 loopback +- `fc00::/7` - IPv6 unique local addresses +- `fe80::/10` - IPv6 link-local addresses + +**Allowed hosts:** + +- `*.anthropic.com` - Claude API and services +- `platform.claude.com:443` - Claude platform services + +The default policy blocks access to private networks, localhost, and cloud +metadata services while allowing internet access. Explicitly allowed hosts +bypass CIDR checks for performance. + ## Monitor network activity View what your agent is accessing and whether requests are being blocked: @@ -100,16 +126,8 @@ This policy: > [!NOTE] > These CIDR blocks are already blocked by default. The example above shows how -> to explicitly configure them if needed. The default policy blocks: -> -> - `10.0.0.0/8` -> - `127.0.0.0/8` -> - `169.254.0.0/16` -> - `172.16.0.0/12` -> - `192.168.0.0/16` -> - `::1/128` -> - `fc00::/7` -> - `fe80::/10` +> to explicitly configure them. See [Default policy](#default-policy) for the +> complete list. ### Example: Restrict to package managers only @@ -317,8 +335,7 @@ first sandbox starts, but only if it doesn't already exist. The current default policy is `allow`, which permits all outbound connections except to blocked CIDR ranges (private networks, localhost, and cloud metadata -services). This default will change to `deny` in a future release to provide -more restrictive defaults. +services). You can modify the default policy: